Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Tsinghua University(Science and Technology)》 2009-06
Add to Favorite Get Latest Update

Discovering functional dependencies with degrees of satisfaction using attribute pre-scanning

WEI Qiang,ZHOU Xiaocang(Department of Management Science and Engineering,School of Economics and Management,Tsinghua University,Beijing 100084,China)  
The functional dependency(FD) is a key constraint knowledge in relational databases and data modeling.However,noisy data and low efficiencies restrict the ability to mine functional dependencies in massive databases.Functional dependencies with degrees of satisfaction were used to discover minimal sets of functional dependencies(MFDD).The method not only measures the noises,but also efficiently discovers the minimal set of functional dependencies.A degree of diversity was used with a pre-scanning operation to evaluate the attribute value diversity to develop three optimization strategies for the functional dependency with a degree of satisfaction.Both theoretical analyses and test results show that the algorithm significantly improves the mining efficiency.
【Fund】: 国家自然科学基金资助项目(70231010 70621061)
【CateGory Index】: TP311.13
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 JIN Minsuo,SUN Qiu,ZHU Dan(Information Network Center,Heilongjiang Institute of Science & Technology,Harbin 150027,China);Application of boundary detection algorithm in invasion pattern classification and feature extraction[J];Journal of Heilongjiang Institute of Science and Technology;2011-02
【Co-references】
Chinese Journal Full-text Database 7 Hits
1 ZOU Tao,SUN Hong-wei,TIAN Xin-guang,ZHANG Er-yang(College of Electronic Science and Engineering,National Univ. of Defense Technology,Changsha 410073,China);Data Reduction in Network Based on the Intrusion Detection System[J];Journal of National University of Defense Technology;2003-06
2 HUANG Guang-qiu,LI Xuan(Department of Management,Xi'an University of Architecture and Technology,Xi'an 710055,China);An intrusion detection system based on memory principle[J];Journal of Hebei University of Engineering(Natural Science Edition);2008-01
3 WANG Xiuqin,XIA Hongyang(College of Electrical and Information Engineering,Heilongjiang Institute of Science and Technology,Harbin 150027,China);Ear identification based on improved algorithm of moment invariant[J];Journal of Heilongjiang Institute of Science and Technology;2008-01
4 DENG Qinghua,JIN Cong,ZHANG Qingguo Department of Computer Science,Central China Normal University,Wuhan 430079,China;Dynamic propagation model of network worm[J];Computer Engineering and Applications;2011-06
5 YANG Xian-dong, YE Shao-zhen (College of Mathematics and Computer Science, Fuzhou University, Fuzhou Fujian350108, China);Content-based feature extraction and retrieval method of MRI brain tumorimage[J];Journal of Computer Applications;2009-S2
6 XIN Zhiyun1,2,GU Ming2(1.Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China; 2.School of Software,Tsinghua University,Beijing 100084,China);Complicated financial data time series forecasting analysis based on least square support vector machine[J];Journal of Tsinghua University(Science and Technology);2008-07
7 WANG Jin-shui, ZHANG Dong-zhan, SHI Xiu-sheng, LAI Xing-rui (Computer Science Department, Xiamen University,Xiamen 361005, China);Adaptive Web Intrusion Detection Based on Immune and Fuzzy Logic[J];Mind and Computation;2009-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved